CN114629820A - Network connectivity detection method, device, equipment and medium - Google Patents

Network connectivity detection method, device, equipment and medium Download PDF

Info

Publication number
CN114629820A
CN114629820A CN202210306758.2A CN202210306758A CN114629820A CN 114629820 A CN114629820 A CN 114629820A CN 202210306758 A CN202210306758 A CN 202210306758A CN 114629820 A CN114629820 A CN 114629820A
Authority
CN
China
Prior art keywords
message
target
virtual machine
detection
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210306758.2A
Other languages
Chinese (zh)
Other versions
CN114629820B (en
Inventor
周俊
高海峰
陈子康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Alibaba China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba China Co Ltd filed Critical Alibaba China Co Ltd
Priority to CN202210306758.2A priority Critical patent/CN114629820B/en
Publication of CN114629820A publication Critical patent/CN114629820A/en
Application granted granted Critical
Publication of CN114629820B publication Critical patent/CN114629820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]

Abstract

A method, apparatus, device and medium for detecting network connectivity are provided. By generating an ARP message based on a probe message in the case where the virtual switch receives the probe message of the target server, sending the ARP message to the target virtual machine, and sends a first message indicating that the target virtual machine is in a connected state to the target server under the condition of receiving the ARP reply message of the target virtual machine, so that the target server determines that the target server and the target virtual machine are in a connected state under the condition that the target server receives the first message, the detection of the internal connectivity of the virtual machine is realized through the ARP message, thereby avoiding ICMP message invading the virtual machine, preventing the network connectivity detection process from being limited by the user security group, improving the accuracy of the network connectivity detection result, moreover, the situation that the normal network communication of the virtual machine is influenced because the ICMP message invades into the virtual machine does not occur.

Description

Network connectivity detection method, device, equipment and medium
Technical Field
One or more embodiments of the present disclosure relate to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a medium for network connectivity detection.
Background
For a multi-tenant platform, such as a cloud computing platform, detection of network connectivity is widely applied to multiple links of daily release, operation monitoring, operation and maintenance diagnosis and the like, and has important significance for quickly detecting and positioning network problems.
In the related art, when performing network connectivity detection, the network connectivity detection is mainly implemented by an Internet Packet explorer (Ping) program. Taking a detection process for network connectivity of a user virtual machine as an example, an Internet message Control Protocol (ICMP) message is sent to the user virtual machine through a Ping program, the virtual machine can respond to an ICMP message or an error message, and the Ping program can determine reachability of the user virtual machine, that is, a connection state of the user virtual machine, according to the received ICMP message.
In the implementation process, the ICMP message intruding into the virtual machine is limited by the user security group, which may result in poor accuracy of the network connectivity detection result, and the intrusion of the ICMP message into the virtual machine may also interfere with normal network communication of the user virtual machine.
Disclosure of Invention
In view of this, one or more embodiments of the present specification provide a method, an apparatus, a device, and a medium for network connectivity detection.
To achieve the above object, one or more embodiments of the present disclosure provide the following technical solutions:
according to a first aspect of one or more embodiments of the present specification, a network connectivity detection method is provided, which is applied to a virtual switch, and includes:
responding to a detection message received from a target server, and generating an address resolution ARP message based on the detection message, wherein the detection message is used for detecting the communication state of a target virtual machine;
sending the ARP message to a target virtual machine;
under the condition of receiving an ARP reply message from a target virtual machine, generating a first message, wherein the first message is used for indicating that the target virtual machine is in a connected state;
and sending a first message to a target server, wherein the target server is used for determining that the target server and the target virtual machine are in a connected state under the condition of receiving the first message.
The method comprises the steps that under the condition that a virtual switch receives a detection message from a target server, an ARP message is generated based on the received detection message, the ARP message is sent to the target virtual machine, and under the condition that an ARP reply message from the target virtual machine is received, a first message indicating that the target virtual machine is in a connected state is sent to the target server, so that under the condition that the target server receives the first message from the virtual switch, the target server and the target virtual machine are determined to be in the connected state, and connectivity detection between the target server and the target virtual machine is achieved. According to the scheme provided by the application, connectivity detection inside the virtual machine (namely, between the virtual interactive machine and the target virtual machine) can be realized through the ARP message, so that the situation that the ICMP message invades the inside of the virtual machine can be avoided, and the transmission of the ARP message cannot be limited by the user security group, so that the network connectivity detection process cannot be limited by the user security group, the accuracy of the network connectivity detection result is improved, and the situation that normal network communication of the virtual machine is influenced because the ICMP message invades the inside of the virtual machine cannot occur.
In some embodiments, after sending the ARP message to the target virtual machine, the method further comprises:
in response to receiving an ARP reply message from the target virtual machine, determining a transmission delay based on a time at which the ARP reply message is received.
In some embodiments, after sending the ARP message to the target virtual machine, the method further comprises:
and in response to the fact that the ARP reply message from the target virtual machine is not received within the preset time length, the ARP message is sent to the target virtual machine again.
In some embodiments, the method further comprises:
responding to the situation that the ARP reply message from the target virtual machine is not received for the continuous preset times, and generating a second message, wherein the second message is used for indicating that the target virtual machine is in a non-connected state;
and sending a second message to the target server, wherein the target server is used for determining that the target server and the target virtual machine are in an unconnected state under the condition of receiving the second message.
In some embodiments, the detection message is a user datagram protocol UDP message encapsulated with a target protocol, the target protocol is a virtual extensible local area network VXLAN protocol, an outer layer source internet protocol IP address of the detection message is an IP address of a target server, an outer layer destination IP address is an IP address of a target gateway, an inner layer source IP address is an IP address of the target server, and an inner layer destination IP address is an IP address of a target virtual machine.
In some embodiments, the first message is an internet message control protocol ICMP message and the second message is an ICMP message.
According to a second aspect of one or more embodiments of the present specification, there is provided a network connectivity detection method applied to a target server, the method including:
generating a detection message encapsulated by a target protocol in response to receiving a detection request from a target terminal;
sending the detection message to a virtual switch corresponding to the target virtual machine, wherein the virtual switch is used for sending an ARP message to the target virtual machine based on the detection message and sending a first message to a target server under the condition of receiving an ARP reply message, and the first message is used for indicating that the target virtual machine is in a connected state;
and under the condition of receiving the first message from the virtual switch, determining that the target server and the target virtual machine are in a connected state.
The method comprises the steps that a target server sends a detection message packaged by a target protocol to a virtual machine switch under the condition that the target server receives a detection request from a target terminal, so that the virtual machine switch can send an ARP message to a target virtual machine based on the received detection message, and sends an ICMP message to the target server under the condition that an ARP reply message is received, so that the target server determines that the target server and the target virtual machine are in a connected state under the condition that the target server receives a first message indicating that the target virtual machine is in the connected state, and connectivity detection between the target server and the target virtual machine is achieved. According to the scheme provided by the application, connectivity detection inside the virtual machine (namely, between the virtual interactive machine and the target virtual machine) can be realized through the ARP message, so that the situation that the ICMP message invades the inside of the virtual machine can be avoided, and the transmission of the ARP message cannot be limited by the user security group, so that the network connectivity detection process cannot be limited by the user security group, the accuracy of the network connectivity detection result is improved, and the situation that normal network communication of the virtual machine is influenced because the ICMP message invades the inside of the virtual machine cannot occur.
In some embodiments, sending the probe packet to a virtual switch corresponding to the target virtual machine includes:
and sending the detection message to a target gateway, wherein the target gateway is used for sending the detection message to a virtual switch corresponding to the target virtual machine.
In some embodiments, the virtual switch is further configured to send a second message to the target server when the ARP reply message from the target virtual machine is not received for a preset number of consecutive times, where the second message is used to indicate that the target virtual machine is in a non-connected state;
after the detection message is sent to the virtual switch corresponding to the target virtual machine, the method further includes:
and under the condition of receiving the second message from the virtual switch, determining that the target server and the target virtual machine are in an unconnected state.
In some embodiments, the target protocol is VXLAN protocol, the probe message is a UDP message, an outer source IP address of the probe message is an IP address of the target server, an outer destination IP address of the target gateway is an IP address of the target gateway, an inner source IP address of the target server is an IP address of the target server, and an inner destination IP address of the target virtual machine is an IP address of the target virtual machine.
In some embodiments, the first message is an ICMP message and the second message is an ICMP message.
In some embodiments, the probe request carries network configuration information of the target virtual machine, where the network configuration information at least includes address information of the target virtual machine and a tunnel identifier corresponding to the target virtual machine.
In some embodiments, the probe request is generated by the target terminal when the target terminal receives the probe instruction, or the probe request is generated by the target terminal when the target terminal reaches a preset time when the probe task is started.
According to a third aspect of one or more embodiments of the present specification, there is provided a network connectivity detection apparatus applied to a virtual switch, the apparatus including:
the generation module is used for responding to the received detection message from the target server and generating an address resolution ARP message based on the detection message, wherein the detection message is used for detecting the communication state of the target virtual machine;
the sending module is used for sending the ARP message to the target virtual machine;
the generation module is further configured to generate a first message under the condition that the ARP reply message from the target virtual machine is received, where the first message is used to indicate that the target virtual machine is in a connected state;
the sending module is further configured to send a first message to the target server, and the target server is configured to determine that the target server and the target virtual machine are in a connected state when receiving the first message.
In some embodiments, the apparatus further comprises:
and the determining module is used for responding to the received ARP reply message from the target virtual machine and determining the transmission delay based on the time of receiving the ARP reply message.
In some embodiments, the sending module is further configured to resend the ARP packet to the target virtual machine in response to not receiving the ARP reply packet from the target virtual machine within a preset time period.
In some embodiments, the generating module is further configured to generate a second message in response to not receiving the ARP reply message from the target virtual machine for a preset number of consecutive times, where the second message is used to indicate that the target virtual machine is in a non-connected state;
the sending module is further configured to send a second message to the target server, and the target server is configured to determine that the target server and the target virtual machine are in an unconnected state when receiving the second message.
In some embodiments, the detection message is a user datagram protocol UDP message encapsulated with a target protocol, the target protocol is a virtual extensible local area network VXLAN protocol, an outer layer source internet protocol IP address of the detection message is an IP address of a target server, an outer layer destination IP address is an IP address of a target gateway, an inner layer source IP address is an IP address of the target server, and an inner layer destination IP address is an IP address of a target virtual machine.
In some embodiments, the first message is an internet message control protocol ICMP message and the second message is an ICMP message.
According to a fourth aspect of one or more embodiments of the present specification, there is provided a network connectivity detection apparatus applied to a target server, the apparatus including:
the generating module is used for responding to a detection request received from a target terminal and generating a detection message encapsulated by a target protocol;
the system comprises a sending module, a virtual switch and a target server, wherein the sending module is used for sending a detection message to the virtual switch corresponding to a target virtual machine, the virtual switch is used for sending an ARP message to the target virtual machine based on the detection message, and sending a first message to the target server under the condition of receiving an ARP reply message, and the first message is used for indicating that the target virtual machine is in a connected state;
and the determining module is used for determining that the target server and the target virtual machine are in a connected state under the condition of receiving the first message from the virtual switch.
In some embodiments, the sending module, when configured to send the probe packet to the virtual switch corresponding to the target virtual machine, is configured to:
and sending the detection message to a target gateway, wherein the target gateway is used for sending the detection message to a virtual switch corresponding to the target virtual machine.
In some embodiments, the virtual switch is further configured to send a second message to the target server when the ARP reply message from the target virtual machine is not received for a preset number of consecutive times, where the second message is used to indicate that the target virtual machine is in a non-connected state;
the determining module is further configured to determine that the target server and the target virtual machine are in an unconnected state when the second message from the virtual switch is received.
In some embodiments, the target protocol is VXLAN protocol, the probe message is a user datagram protocol UDP message, an outer layer source internet protocol IP address of the probe message is an IP address of the target server, an outer layer destination IP address is an IP address of the target gateway, an inner layer source IP address is an IP address of the target server, and an inner layer destination IP address is an IP address of the target virtual machine.
In some embodiments, the first message is an internet message control protocol ICMP message and the second message is an ICMP message.
In some embodiments, the probe request carries network configuration information of the target virtual machine, where the network configuration information at least includes address information of the target virtual machine and a tunnel identifier corresponding to the target virtual machine.
In some embodiments, the probe request is generated by the target terminal when the target terminal receives the probe instruction, or the probe request is generated by the target terminal when the target terminal reaches a preset time when the probe task is started.
According to a fifth aspect of one or more embodiments herein, there is provided a network device, comprising:
a processor;
a memory for storing processor-executable instructions;
the processor executes the executable instructions to implement the operations performed by the network connectivity detection method provided in any one of the first aspect and the first aspect.
According to a sixth aspect of one or more embodiments herein, there is provided a server, comprising:
a processor;
a memory for storing processor-executable instructions;
the processor executes the executable instructions to implement the operations performed by the network connectivity detection method provided by any one of the second aspect and the second aspect.
According to a seventh aspect of one or more embodiments of the present specification, a computer-readable storage medium is provided, on which computer instructions are stored, and when executed by a processor, the computer instructions implement the operations performed by the network connectivity detection method provided in any one of the first aspect and the first aspect.
According to an eighth aspect of one or more embodiments of the present specification, a computer-readable storage medium is provided, on which computer instructions are stored, and the computer instructions, when executed by a processor, implement the operations performed by the network connectivity detection method provided by any one of the second aspect and the second aspect.
According to a ninth aspect of one or more embodiments of the present specification, a computer program product is provided, which includes a computer program that, when executed by a processor, implements the operations performed by the network connectivity detection method provided in any one of the first aspect and the first aspect.
According to a tenth aspect of one or more embodiments of the present specification, a computer program product is provided, which includes a computer program that, when executed by a processor, implements the operations performed by the network connectivity detection method provided in any one of the second aspect and the second aspect.
Drawings
Fig. 1 is an architecture diagram of a network connectivity detection system according to an exemplary embodiment.
Fig. 2 is a flowchart of a method for detecting network connectivity according to an exemplary embodiment.
Fig. 3 is a block diagram of a network connectivity detection apparatus according to an exemplary embodiment.
Fig. 4 is a block diagram of a network connectivity detection apparatus according to an exemplary embodiment.
Fig. 5 is a schematic block diagram of a network device according to an exemplary embodiment.
Fig. 6 is a schematic block diagram of a network device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
First, technical terms referred to in the present application are introduced.
Virtual Machine (VM): refers to a complete computer system with complete hardware system functionality, which is simulated by software and runs in a completely isolated environment.
Virtual switch: the switching element is formed by software, so that the virtual switch is called a software switch, and compared with a traditional physical switch, the virtual switch has the following advantages:
1. the configuration is flexible. Because the method is realized by software, dozens or hundreds of virtual switches can be configured on one physical server, and the number of ports can be flexibly selected;
2. the cost is low. Switching speeds of 10Gbps (gigabits per second) can be easily achieved by means of software.
Address Resolution Protocol (ARP): a Transmission Control Protocol (TCP)/IP Protocol for acquiring a physical address according to an Internet Protocol (IP) address. When the host sends information, the ARP request containing the destination IP address is broadcasted to all the hosts on the local area network, and the return message is received, so that the physical address of the target host is determined.
The application provides a network connectivity detection method, which is used for detecting connectivity between a target server and a target virtual machine. Referring to fig. 1, fig. 1 is an architecture diagram of a network connectivity detection system provided in an exemplary embodiment, and as shown in fig. 1, the network connectivity detection system includes a target terminal 101, a target server 102, a target gateway 103, a virtual switch 104, and a target virtual machine 105.
The target terminal 101 may be a smart phone, a tablet computer, a desktop computer, a portable computer, and the like, and the target server 102 may be one server, multiple servers, a server cluster, a cloud computing platform, and the like, and the device types of the target terminal 101 and the target server 102 are not limited in the present application.
The target terminal 101 and the target server 102 can communicate in a wired or wireless connection mode, the target server 102 and the target gateway 103 can communicate in a wired or wireless connection mode, the target gateway 103 and the virtual switch 104 can communicate in a wireless connection mode, and the virtual switch 104 and the target virtual machine 105 can communicate in a wireless connection mode, so that connectivity detection between the target server 102 and the target virtual machine 105 is realized through interaction among the target terminal 101, the target server 102, the target gateway 103, the virtual switch 104 and the target virtual machine 105.
The foregoing is only an exemplary architecture, and in more possible implementations, the network connectivity detection system may also adopt other architecture, which is not limited in this application.
After introducing the architecture of the network connectivity detection system according to the present application, a specific implementation process of the present application is described below.
Referring to fig. 2, fig. 2 is a flowchart of a network connectivity detection method provided in an exemplary embodiment, and as shown in fig. 2, the method includes:
step 201, the target server responds to the received detection request from the target terminal, and generates a detection message encapsulated by a target protocol, wherein the detection message is used for detecting the communication state of the target virtual machine.
The probe request may be any type of request, for example, the probe request may be a hypertext Transfer Protocol (HTTP) request, and optionally, the probe request may also be other types of requests, and the specific type of the probe request is not limited in the present application.
It should be noted that the destination IP in the five-tuple information of the probe packet may be set as the IP address of the target virtual machine, so that the probe packet may be used to detect the connection state of the target virtual machine.
Step 202, the target server sends the detection message to a virtual switch corresponding to the target virtual machine.
It should be noted that the correspondence between each virtual machine and the virtual switch may be preset, and one virtual switch may correspond to multiple virtual machines and be used to forward messages generated or received by the multiple virtual machines.
Step 203, the virtual switch responds to the received detection message from the target server, and generates an address resolution ARP message based on the detection message.
In a possible implementation manner, after receiving the probe message, the virtual switch may parse the received probe message to obtain quintuple information of the probe message, so as to generate an ARP message according to the quintuple information obtained by parsing, where a destination IP address in the quintuple information of the ARP message is also an IP address of the target virtual machine, so that reachability of the target virtual machine can be detected through the ARP message.
And step 204, the virtual machine switch sends the ARP message to the target virtual machine.
Step 205, the target virtual machine generates an ARP reply message in response to receiving the ARP message from the virtual switch.
Step 206, the target virtual machine sends an ARP reply message to the virtual switch.
Step 207, the virtual switch generates a first message under the condition that the virtual switch receives the ARP reply message from the target virtual machine, wherein the first message is used for indicating that the target virtual machine is in a connected state.
In a possible implementation manner, a destination IP address in the five-tuple information of the first packet may be set as an IP address of the target server, so that the first packet may be subsequently sent to the target server based on the five-tuple information of the first packet.
Step 208, the virtual switch sends the first message to the target server.
Step 209, the target server determines that the target server and the target virtual machine are in a connected state when receiving the first message from the virtual switch.
According to the method and the device, under the condition that the target server receives a detection request from a target terminal, a detection message packaged by a target protocol is sent to the virtual machine switch, the virtual machine switch can generate an ARP message based on the received detection message and send the ARP message to the target virtual machine, so that the target virtual machine returns an ARP reply message to the virtual machine switch under the condition that the ARP reply message is received, the virtual machine switch can send a first message indicating that the target virtual machine is in a connected state to the target server under the condition that the ARP reply message from the target virtual machine is received, and the target server determines that the target server and the target virtual machine are in the connected state under the condition that the target server receives the first message from the virtual machine switch, so that connectivity detection between the target server and the target virtual machine is achieved. According to the scheme provided by the application, connectivity detection inside the virtual machine (namely, between the virtual interactive machine and the target virtual machine) can be realized through the ARP message, so that the situation that the ICMP message invades the inside of the virtual machine can be avoided, and the transmission of the ARP message cannot be limited by the user security group, so that the network connectivity detection process cannot be limited by the user security group, the accuracy of the network connectivity detection result is improved, and the situation that normal network communication of the virtual machine is influenced because the ICMP message invades the inside of the virtual machine cannot occur.
The above is merely a description of the basic implementation of the present application, and various alternative implementations of the present application are described below.
In some embodiments, for step 201, the probe request received by the target server from the target terminal may be generated by the target terminal when the target terminal receives the probe instruction, or may be generated by the target terminal when a preset time is reached under the condition that the probe task is started, which will be described below.
For a probe request generated by a target terminal upon receiving a probe instruction, the probe instruction may be manually triggered on the target terminal by a relevant technician, and the target terminal may generate the probe request in response to the probe instruction triggered by the relevant technician. For example, a detection option may be set on a visual interface of the target terminal, and the relevant technician may trigger the detection option to trigger the detection instruction, so that the target terminal may generate the detection request in response to the detection instruction triggered by the relevant technician.
The generation of the probe request is carried out by responding to the probe instruction triggered by the related technical personnel, and the time for triggering the probe instruction can be selected by the related technical personnel according to the technical requirements, so that the network connectivity of the virtual machine can be actively detected by responding to the probe instruction triggered by the related technical personnel under the condition of network connectivity detection requirement.
For a detection request generated by the target terminal at a preset time when the detection task is started, a related technician can start the detection task through the target terminal, and the target terminal can generate a detection request every other preset time when the detection task is started. When a related technician starts a detection task through a target terminal, a visual interface of the target terminal can be provided with a detection task starting option, and the related technician can trigger the detection task starting option to start the detection task, so that the target terminal can generate a detection request every other preset time (namely every time a preset time is reached) under the condition that the detection task is started.
The detection task is started, and the detection request is generated at intervals of preset time, so that the connectivity of the virtual machine can be detected at intervals of the preset time, the normalized detection of the connectivity of the virtual machine can be realized, and the abnormal communication condition of the virtual machine can be found in time.
The above are only two exemplary ways of triggering generation of a probe request, and in more possible implementations, other ways may also be adopted to trigger generation of a probe request, and the manner of triggering generation of a probe request is not limited in the present application.
The generated detection request may carry network configuration information of the target virtual machine, where the network configuration information at least includes address information of the target virtual machine and a tunnel identifier corresponding to the target virtual machine.
Optionally, the address information of the target Virtual machine may be an Elastic Computing Service (ECS) Overlay network address, and the Tunnel identifier corresponding to the target Virtual machine may be a Virtual Private Cloud (VPC) Tunnel identifier (Tunnel ID).
Through the above process, the generation of the probe request can be realized, so that the process of generating the probe packet encapsulated by the target protocol in step 201 can be triggered.
In some embodiments, the probe message may be a User Datagram Protocol (UDP) message encapsulated by a target Protocol, and the target Protocol may be a Virtual Extensible Local Area Network (VXLAN) Protocol.
The outer layer source internet protocol IP address of the detection message is the IP address of the target server, the outer layer target IP address is the IP address of the target gateway, the inner layer source IP address is the IP address of the target server, and the inner layer target IP address is the IP address of the target virtual machine.
After the detection message is generated, the generated detection message can be sent to the virtual switch. In some embodiments, for step 202, when the target server sends the probe packet to the virtual switch corresponding to the target virtual machine, the following steps may be performed:
and sending the detection message to a target gateway, wherein the target gateway is used for sending the detection message to a virtual switch corresponding to the target virtual machine.
It should be noted that, when encapsulating the UDP packet, the outer layer destination IP address is set as the IP address of the target gateway, so that when sending the detection packet, the target server can send the detection packet obtained by encapsulation to the target gateway according to the outer layer destination IP address, and when receiving the detection packet, the target gateway can decapsulate the received detection packet, thereby obtaining the inner layer destination IP address, so that the target gateway can send the detection packet to the virtual switch corresponding to the target virtual machine based on the obtained inner layer IP address.
It should be noted that, when receiving the probe message, the virtual switch may intercept an ICMP request carried by the probe message, and generate an ARP message based on the probe message in step 203, and then send the generated ARP message to the target virtual machine in step 204, so that the virtual switch may perform network connectivity detection inside the virtual machine through the ARP message, thereby preventing the ICMP message from invading the virtual machine in the network connectivity detection process.
In some embodiments, the target virtual machine may generate an ARP reply message in step 205 when receiving the ARP reply message, and then feed back the generated ARP reply message to the virtual switch in step 206, so that the virtual switch may determine that the communication state inside the virtual machine is normal when receiving the ARP reply message from the target virtual machine, thereby implementing connectivity detection inside the virtual machine.
In some embodiments, when connectivity detection inside a virtual machine is implemented through an ARP message and it is determined that a connected state inside the virtual machine is normal, the virtual switch may construct a first message indicating that the target virtual machine is in the connected state, and return the first message to the target server, so that the target server may determine that the connected state between the target server and the target virtual machine is normal, that is, the target server and the target virtual machine are in the connected state, when receiving the first message.
In a possible implementation manner, for step 208, when the virtual switch sends the first packet to the target server, the virtual switch may send the first packet to the target gateway, and the target gateway forwards the first packet to the target server, so that the target server may determine that the target server and the target virtual machine are in a connected state in a case that the target server receives the first packet.
Optionally, after sending the ARP packet to the target virtual machine, the virtual switch may further determine, in response to receiving an ARP reply packet from the target virtual machine, a transmission delay based on a time when the ARP reply packet is received.
In addition, the target server can generate a detection response under the condition that the first message is received, and the detection response is returned to the target terminal, so that the target terminal can determine that the target terminal and the target virtual machine are in a connected state under the condition that the target terminal receives the detection response.
The first message may be an ICMP message, the probe response may be an HTTP response, and optionally, the first message may be a message of another type, and the probe response may be a response of another type, which only needs to ensure that the type of the probe response is consistent with the type of the probe request.
Optionally, for any device in the target terminal, the target server, and the virtual switch, after receiving a packet or a response fed back by another device in the network connectivity detection system, the device may determine the network connectivity quality based on a packet loss rate of the received packet or response.
In addition, the messages or responses fed back by other devices may also carry various types of information, such as the number of links established by the virtual machine, the retransmission rate, and the like, so that the network quality of the network connectivity detection system may be determined based on the messages or responses fed back by other devices that may also carry various types of information.
The above embodiments are described by taking a case where the connectivity of the network connectivity detection system is normal as an example, in other embodiments, the connectivity of the network connectivity detection system may be in an abnormal state.
In some embodiments, for step 204, after the virtual machine switch sends the ARP packet to the target virtual machine, if the ARP reply packet from the target virtual machine is not received within the preset time length, the virtual machine switch may send the ARP packet to the target virtual machine again in response to not receiving the ARP reply packet from the target virtual machine within the preset time length.
In a possible implementation manner, if the retransmitted ARP packet gets the response of the target virtual machine, the following steps 205 to 209 may be performed to implement connectivity detection between the target server and the target virtual machine.
In another possible implementation manner, in response to that an ARP reply message from the target virtual machine is not received for a preset number of consecutive times, the virtual switch may generate a second message, where the second message is used to indicate that the target virtual machine is in an unconnected state; and further sending a second message to the target server, so that the target server can determine that the target server and the target virtual machine are in an unconnected state under the condition that the target server receives the second message.
Optionally, the preset number may be any value, for example, the preset number may be 3 times, and in addition, the preset number may also be other values, and the specific value of the preset number is not limited in this application.
When the second message may also be an ICMP message, what is different from the ICMP message as the first message is that the values of the data portions of the ICMP as the first message and the ICMP as the second message are different, so that the first message may indicate that the target virtual machine is in a connected state, and the second message may indicate that the target virtual machine is in an unconnected state.
Through the processes, the full-link detection process can be divided into two stages of a target terminal, a target server, a virtual switch and a target virtual machine, wherein the detection process of the target terminal, the target server and the virtual switch belongs to a front-end detection part, and the detection process of the virtual switch, the target virtual machine belongs to a rear-end detection part, so that the front end and the rear end can be covered by the network connectivity detection process, and the usability of the network connectivity detection method can be improved.
In addition, the network connectivity detection method provided by the application does not need to send an ICMP message to the inside of the virtual machine, is not limited by a user security group, has more accurate monitoring results, and can actively run or normally run, so that the flexibility of the network connectivity detection process can be improved.
Corresponding to the embodiments of the method, the present specification also provides embodiments of the device and the applied equipment.
Referring to fig. 3, fig. 3 is a block diagram of a network connectivity detection apparatus provided in an exemplary embodiment, which is applied to a virtual switch, and the apparatus includes:
a generating module 301, configured to generate, in response to receiving a detection message from a target server, an address resolution ARP message based on the detection message, where the detection message is used to detect a connection state of a target virtual machine;
a sending module 302, configured to send the ARP packet to the target virtual machine;
the generating module 301 is further configured to generate a first message when receiving an ARP reply message from the target virtual machine, where the first message is used to indicate that the target virtual machine is in a connected state;
the sending module 302 is further configured to send a first message to a target server, where the target server is configured to determine that the target server and the target virtual machine are in a connected state when receiving the first message.
In some embodiments, the apparatus further comprises:
and the determining module is used for responding to the received ARP reply message from the target virtual machine and determining the transmission delay based on the time of receiving the ARP reply message.
In some embodiments, the sending module 302 is further configured to resend the ARP packet to the target virtual machine in response to not receiving the ARP reply packet from the target virtual machine within a preset time period.
In some embodiments, the generating module 301 is further configured to generate a second message in response to that the ARP reply message from the target virtual machine is not received for a preset number of consecutive times, where the second message is used to indicate that the target virtual machine is in a non-connected state;
the sending module 302 is further configured to send a second message to the target server, where the target server is configured to determine that the target server and the target virtual machine are in an unconnected state when receiving the second message.
In some embodiments, the detection message is a user datagram protocol UDP message encapsulated with a target protocol, the target protocol is a virtual extensible local area network VXLAN protocol, an outer layer source internet protocol IP address of the detection message is an IP address of a target server, an outer layer destination IP address is an IP address of a target gateway, an inner layer source IP address is an IP address of the target server, and an inner layer destination IP address is an IP address of a target virtual machine.
In some embodiments, the first message is an internet message control protocol ICMP message and the second message is an ICMP message.
Referring to fig. 4, fig. 4 is a block diagram of a network connectivity detecting apparatus provided in an exemplary embodiment, which is applied to a target server, and the apparatus includes:
a generating module 401, configured to generate a probe packet encapsulated by a target protocol in response to receiving a probe request from a target terminal;
a sending module 402, configured to send the detection message to a virtual switch corresponding to the target virtual machine, where the virtual switch is configured to send an ARP message to the target virtual machine based on the detection message, and send a first message to the target server when receiving an ARP reply message, where the first message is used to indicate that the target virtual machine is in a connected state;
the determining module 403 is configured to determine that the target server and the target virtual machine are in a connected state when the first packet from the virtual switch is received.
In some embodiments of the present invention, the,
the sending module 402, when configured to send the probe packet to the virtual switch corresponding to the target virtual machine, is configured to:
and sending the detection message to a target gateway, wherein the target gateway is used for sending the detection message to a virtual switch corresponding to the target virtual machine.
In some embodiments, the virtual switch is further configured to send a second message to the target server when the ARP reply message from the target virtual machine is not received for a preset number of consecutive times, where the second message is used to indicate that the target virtual machine is in a non-connected state;
the determining module 403 is further configured to determine that the target server and the target virtual machine are in an unconnected state when receiving the second packet from the virtual switch.
In some embodiments, the target protocol is VXLAN protocol, the probe message is a UDP message, an outer source IP address of the probe message is an IP address of the target server, an outer destination IP address of the target gateway is an IP address of the target gateway, an inner source IP address of the target server is an IP address of the target server, and an inner destination IP address of the target virtual machine is an IP address of the target virtual machine.
In some embodiments, the first message is an internet message control protocol ICMP message and the second message is an ICMP message.
In some embodiments, the probe request carries network configuration information of the target virtual machine, where the network configuration information at least includes address information of the target virtual machine and a tunnel identifier corresponding to the target virtual machine.
In some embodiments, the probe request is generated by the target terminal when the target terminal receives the probe instruction, or the probe request is generated by the target terminal when the target terminal reaches a preset time when the probe task is started.
The implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
The present application further provides a network device, and referring to fig. 5, fig. 5 is a schematic structural diagram of a network device provided in an exemplary embodiment. Referring to fig. 5, the network device may be implemented based on software, and in the software level, the network device may include implementation modules corresponding to the processor 502, the internal bus 504, the network interface 506, the memory 508 and the nonvolatile memory 510, and may also include software components required by other functions. One or more embodiments of the present description may be implemented in software, such as by processor 502 reading corresponding computer programs from non-volatile storage 510 into memory 508 and then running. Of course, besides software implementation, the one or more embodiments in this specification do not exclude other implementations, such as logic devices or combinations of software and hardware, and so on, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
The present application further provides a server, and referring to fig. 6, fig. 6 is a schematic structural diagram of a network device according to an exemplary embodiment. Referring to fig. 6, at the hardware level, the apparatus includes a processor 602, an internal bus 604, a network interface 606, a memory 608, and a non-volatile memory 610, but may also include hardware required for other functions. One or more embodiments of the present description may be implemented in software, such as by processor 602 reading corresponding computer programs from non-volatile memory 610 into memory 608 and then executing. Of course, besides software implementation, the one or more embodiments in this specification do not exclude other implementations, such as logic devices or combinations of software and hardware, and so on, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
The present application further provides a computer program product comprising a computer program, which when executed by a processor, implements the network connectivity detection method provided in any embodiment of the present application.
The methods, apparatuses, devices or modules illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer-readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read-Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-change Random Access Memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash Memory, or other Memory technologies, compact disk Read Only Memory (CD-ROM), Digital Versatile Disk (DVD) or other optical storage, magnetic cassettes, magnetic disk storage, quantum Memory, graphene-based storage media or other magnetic storage devices, or any other non-transmission medium may be used to store information which can be accessed by a computing device. As defined herein, computer readable Media does not include Transitory computer readable Media such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The above description is only for the purpose of illustrating the preferred embodiments of the one or more embodiments of the present disclosure, and is not intended to limit the scope of the one or more embodiments of the present disclosure, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the one or more embodiments of the present disclosure should be included in the scope of the one or more embodiments of the present disclosure.

Claims (14)

1. A network connectivity detection method is applied to a virtual switch, and comprises the following steps:
responding to a detection message received from a target server, and generating an address resolution ARP message based on the detection message, wherein the detection message is used for detecting the communication state of a target virtual machine;
sending the ARP message to the target virtual machine;
generating a first message under the condition of receiving an ARP reply message from the target virtual machine, wherein the first message is used for indicating that the target virtual machine is in a connected state;
and sending the first message to the target server, wherein the target server is used for determining that the target server and the target virtual machine are in a connected state under the condition of receiving the first message.
2. The method of claim 1, wherein after sending the ARP packet to the target virtual machine, the method further comprises:
and responding to the received ARP reply message from the target virtual machine, and determining transmission delay based on the time of receiving the ARP reply message.
3. The method of claim 1, wherein after sending the ARP packet to the target virtual machine, the method further comprises:
and in response to not receiving the ARP reply message from the target virtual machine within a preset time length, re-sending the ARP message to the target virtual machine.
4. The method of claim 3, further comprising:
responding to the situation that the ARP reply message from the target virtual machine is not received for the continuous preset times, and generating a second message, wherein the second message is used for indicating that the target virtual machine is in a non-connected state;
and sending the second message to the target server, wherein the target server is used for determining that the target server and the target virtual machine are in an unconnected state under the condition of receiving the second message.
5. The method according to any one of claims 1 to 4, wherein the detection message is a User Datagram Protocol (UDP) message encapsulated by a target protocol, the target protocol is a virtual extensible local area network (VXLAN) protocol, an outer layer source Internet Protocol (IP) address of the detection message is an IP address of the target server, an outer layer destination IP address is an IP address of a target gateway, an inner layer source IP address is an IP address of the target server, and an inner layer destination IP address is an IP address of a target virtual machine; the first message is an internet message control protocol (ICMP) message, and the second message is an ICMP message.
6. A network connectivity detection method is applied to a target server, and the method comprises the following steps:
generating a detection message encapsulated by a target protocol in response to receiving a detection request from a target terminal;
sending the detection message to a virtual switch corresponding to a target virtual machine, wherein the virtual switch is used for sending an ARP message to the target virtual machine based on the detection message and sending a first message to the target server under the condition of receiving an ARP reply message, and the first message is used for indicating that the target virtual machine is in a connected state;
and under the condition of receiving the first message from the virtual switch, determining that the target server and the target virtual machine are in a connected state.
7. The method according to claim 6, wherein the sending the probe packet to the virtual switch corresponding to the target virtual machine includes:
and sending the detection message to a target gateway, wherein the target gateway is used for sending the detection message to a virtual switch corresponding to the target virtual machine.
8. The method according to claim 6, wherein the virtual switch is further configured to send a second message to the target server if the ARP reply message from the target virtual machine is not received for a preset number of consecutive times, where the second message is used to indicate that the target virtual machine is in a non-connected state;
after the detection packet is sent to the virtual switch corresponding to the target virtual machine, the method further includes:
and under the condition of receiving a second message from the virtual switch, determining that the target server and the target virtual machine are in an unconnected state.
9. The method according to any one of claims 6 to 8, wherein the target protocol is VXLAN protocol, the probe message is a User Datagram Protocol (UDP) message, an outer source Internet Protocol (IP) address of the probe message is an IP address of the target server, an outer destination IP address is an IP address of a target gateway, an inner source IP address is an IP address of the target server, and an inner destination IP address is an IP address of a target virtual machine; the first message is an internet message control protocol (ICMP) message, and the second message is an ICMP message.
10. A network connectivity detection apparatus applied to a virtual switch, the apparatus comprising:
the system comprises a generation module, a communication module and a communication module, wherein the generation module is used for responding to a detection message from a target server and generating an address resolution ARP message based on the detection message, and the detection message is used for detecting the communication state of a target virtual machine;
the sending module is used for sending the ARP message to the target virtual machine;
the generating module is further configured to generate a first message under the condition that an ARP reply message from the target virtual machine is received, where the first message is used to indicate that the target virtual machine is in a connected state;
the sending module is further configured to send the first packet to the target server, and the target server is configured to determine that the target server and the target virtual machine are in a connected state when receiving the first packet.
11. A network connectivity detection apparatus, applied to a target server, the apparatus comprising:
the generating module is used for responding to a detection request received from a target terminal and generating a detection message encapsulated by a target protocol;
the sending module is used for sending the detection message to a virtual switch corresponding to a target virtual machine, the virtual switch is used for sending an ARP message to the target virtual machine based on the detection message, and sending a first message to the target server under the condition of receiving an ARP reply message, and the first message is used for indicating that the target virtual machine is in a connected state;
and the determining module is used for determining that the target server and the target virtual machine are in a connected state under the condition of receiving the first message from the virtual switch.
12. A network device, characterized in that the network device comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the network connectivity detection method according to any one of claims 1 to 5 by executing the executable instructions.
13. A server, characterized in that the server comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the network connectivity detection method according to any one of claims 6 to 9 by executing the executable instructions.
14. A computer-readable storage medium having stored thereon computer instructions, which when executed by a processor, implement the network connectivity detection method according to any one of claims 1 to 5; alternatively, the instructions when executed by a processor implement the network connectivity detection method of any of claims 6 to 9.
CN202210306758.2A 2022-03-25 2022-03-25 Network connectivity detection method, device, equipment and medium Active CN114629820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210306758.2A CN114629820B (en) 2022-03-25 2022-03-25 Network connectivity detection method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210306758.2A CN114629820B (en) 2022-03-25 2022-03-25 Network connectivity detection method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN114629820A true CN114629820A (en) 2022-06-14
CN114629820B CN114629820B (en) 2023-09-12

Family

ID=81904636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210306758.2A Active CN114629820B (en) 2022-03-25 2022-03-25 Network connectivity detection method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN114629820B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7523185B1 (en) * 2004-01-13 2009-04-21 Cisco Technology, Inc. Method and apparatus for providing automatic frame relay and ATM provisioning of network devices
CN102868605A (en) * 2012-09-05 2013-01-09 浙江宇视科技有限公司 Looped network data protection method and device
WO2014101394A1 (en) * 2012-12-24 2014-07-03 华为技术有限公司 Method, device and system for transmitting message in virtual extensible local area network
US8909766B1 (en) * 2011-10-04 2014-12-09 Amazon Technologies, Inc. Techniques for providing information about network connection status
CN104202266A (en) * 2014-08-04 2014-12-10 福建星网锐捷网络有限公司 Communication method, switch, controller and communication system
CN104243304A (en) * 2013-06-18 2014-12-24 中国联合网络通信集团有限公司 Data processing method, device and system of locally-connected topological structure
CN104468855A (en) * 2013-09-25 2015-03-25 阿里巴巴集团控股有限公司 Method and device for processing ARP message
WO2015180292A1 (en) * 2014-05-27 2015-12-03 中兴通讯股份有限公司 Method and apparatus for detecting user network interface connectivity of virtual private network
WO2016082588A1 (en) * 2014-11-26 2016-06-02 中兴通讯股份有限公司 Link connectivity checking method and apparatus
WO2017133291A1 (en) * 2016-02-02 2017-08-10 华为技术有限公司 Server cluster-based message generation method and load balancer
CN107544835A (en) * 2017-08-21 2018-01-05 新华三云计算技术有限公司 A kind of detection method and device of virtual machine service network port
CN107733800A (en) * 2017-11-29 2018-02-23 郑州云海信息技术有限公司 A kind of SDN message transmitting method and its device
CN107770072A (en) * 2016-08-18 2018-03-06 阿里巴巴集团控股有限公司 A kind of method and apparatus for sending and receiving message
CN111510435A (en) * 2020-03-25 2020-08-07 新华三大数据技术有限公司 Network security policy migration method and device
US20200322283A1 (en) * 2015-05-08 2020-10-08 Ooma, Inc. Systems and methods of communications network failure detection and remediation utilizing link probes
CN112702252A (en) * 2019-10-23 2021-04-23 华为技术有限公司 Message processing method, system and related equipment
CN113949649A (en) * 2021-10-14 2022-01-18 迈普通信技术股份有限公司 Fault detection protocol deployment method and device, electronic equipment and storage medium
CN114024870A (en) * 2021-11-12 2022-02-08 中国工商银行股份有限公司 Network connectivity detection method and system

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7523185B1 (en) * 2004-01-13 2009-04-21 Cisco Technology, Inc. Method and apparatus for providing automatic frame relay and ATM provisioning of network devices
US8909766B1 (en) * 2011-10-04 2014-12-09 Amazon Technologies, Inc. Techniques for providing information about network connection status
CN102868605A (en) * 2012-09-05 2013-01-09 浙江宇视科技有限公司 Looped network data protection method and device
WO2014101394A1 (en) * 2012-12-24 2014-07-03 华为技术有限公司 Method, device and system for transmitting message in virtual extensible local area network
CN104243304A (en) * 2013-06-18 2014-12-24 中国联合网络通信集团有限公司 Data processing method, device and system of locally-connected topological structure
CN104468855A (en) * 2013-09-25 2015-03-25 阿里巴巴集团控股有限公司 Method and device for processing ARP message
CN105306284A (en) * 2014-05-27 2016-02-03 中兴通讯股份有限公司 Method and device for detecting connectivity of user network interface of virtual private network
WO2015180292A1 (en) * 2014-05-27 2015-12-03 中兴通讯股份有限公司 Method and apparatus for detecting user network interface connectivity of virtual private network
CN104202266A (en) * 2014-08-04 2014-12-10 福建星网锐捷网络有限公司 Communication method, switch, controller and communication system
WO2016082588A1 (en) * 2014-11-26 2016-06-02 中兴通讯股份有限公司 Link connectivity checking method and apparatus
US20200322283A1 (en) * 2015-05-08 2020-10-08 Ooma, Inc. Systems and methods of communications network failure detection and remediation utilizing link probes
WO2017133291A1 (en) * 2016-02-02 2017-08-10 华为技术有限公司 Server cluster-based message generation method and load balancer
CN107770072A (en) * 2016-08-18 2018-03-06 阿里巴巴集团控股有限公司 A kind of method and apparatus for sending and receiving message
CN107544835A (en) * 2017-08-21 2018-01-05 新华三云计算技术有限公司 A kind of detection method and device of virtual machine service network port
CN107733800A (en) * 2017-11-29 2018-02-23 郑州云海信息技术有限公司 A kind of SDN message transmitting method and its device
CN112702252A (en) * 2019-10-23 2021-04-23 华为技术有限公司 Message processing method, system and related equipment
CN111510435A (en) * 2020-03-25 2020-08-07 新华三大数据技术有限公司 Network security policy migration method and device
CN113949649A (en) * 2021-10-14 2022-01-18 迈普通信技术股份有限公司 Fault detection protocol deployment method and device, electronic equipment and storage medium
CN114024870A (en) * 2021-11-12 2022-02-08 中国工商银行股份有限公司 Network connectivity detection method and system

Also Published As

Publication number Publication date
CN114629820B (en) 2023-09-12

Similar Documents

Publication Publication Date Title
US9124621B2 (en) Security alert prioritization
CN107547349B (en) Virtual machine migration method and device
WO2019120187A1 (en) Non-intrusive mechanism to measure network function packet processing delay
CN108632110B (en) Device performance testing method, system, computer device and storage medium
CN109347670B (en) Path tracking method and device, electronic equipment and storage medium
US11133980B2 (en) Detecting sources of computer network failures
CN106878194B (en) Message processing method and device
CN113472900B (en) Message processing method, device, storage medium and computer program product
CN110224897B (en) Weak network testing method and device of application program, mobile device and storage medium
CN112751862A (en) Port scanning attack detection method and device and electronic equipment
CN112769651B (en) TCP connection detection method and device and electronic equipment
US20180205623A1 (en) Packet loss locating in vxlan
CN107294743B (en) Network path detection method, controller and network equipment
CN107547505B (en) Message processing method and device
CN110691139B (en) Data transmission method, device, equipment and storage medium
JP7228712B2 (en) Abnormal host monitoring
CN114629820B (en) Network connectivity detection method, device, equipment and medium
CN106817316B (en) Method, device and system for detecting path MTU
CN110581792B (en) Message transmission method and device
CN108259294B (en) Message processing method and device
CN115242693A (en) Network detection method, device, equipment and storage medium
CN114978600A (en) Abnormal flow processing method, system, equipment and storage medium
CN111224855B (en) Linux-based virtual network card implementation method, device, equipment and medium
CN105516017A (en) Directed acceleration method and device, and terminal equipment
CN113179251A (en) Front-end file processing method, device, equipment and machine-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant